You are on page 1of 8

1.

voice morphing
The method of transforming the source speaker�s speech to that of the target

speaker is usually referred as Voice Morphing or voice transformation or voice conversion.

Using the linear transformations estimated from time-aligned parallel training data, it

transforms the spectral envelope of the potential speaker in tone with the target speaker.

As the image morphing is analogous in nature, i.e. the source face smoothly changing its

shape and texture to the target face, speech morphing also should smoothly change the

source voice into another, keeping the shared characteristics of the starting and ending

signals. The pitch and the envelope information are two factors that coincide in a speech

signal, which needs to be separated. The method of cepstral analysis is usually employed

to extract the same.

2. Stealth virus
This virus hides from the operating system when the system checks the location

where the virus resides, by forging results that would be anticipated from an uninfected

system. The different kinds of virus, one of them known as fast-infector virus infects not

only programs that are executed but also those that are merely accessed therefore running

antiviral scanning software on a computer infected by such a virus can infect every

program on the computer. Another kind called the slow-infector virus infects files only

while they are modified, so that the modification appears legitimate to checksumming

software. Yet another kind called the sparse-infector virus infects only on certain

occasions—for example, it may infect every tenth program executed. This strategy makes it

more difficult to detect the virus.

3. Java Cryptography Architecture


The Java Cryptography Architecture (JCA) is a framework for working with

cryptography using the Java programming language. It forms part of the Java security API,

and was first introduced in JDK 1.1 in the java.security package.


4. Digital cash
Developed as an alternative to the online transactions using the credit card, it

has lot of advantages when compared with the latter. This digital version of real money,

which is of one time use, can always protects the secrecy and thus prevents it from

counterfeiting. More details can be got from once and that is hard to forge.

5. holographic versatile disc (hvd)


It's an optical disc technology still in the childhood stages of research called

as the collinear holography, would soon gain upper hand over the existing technologies

like the blue-ray and HD DVD optical disc systems with respect to its storage capacity.

Consisting of a blue-green laser and a red laser collimated in a single beam, the blue-

green laser reads data encoded as laser interference fringes from a holographic layer near

the top of the disc while the red laser is used as the reference beam and to read servo

information from a regular CD-style aluminium layer near the bottom.

6. wifiber
A new wireless technology could beat fiber optics for speed in some applications.
Atop each of the Trump towers in New York City, there s a new type of wireless

transmitter and receiver that can send and receive data at rates of more than one gigabit

per second -- fast enough to stream 90 minutes of video from one tower to the next, more

than one mile apart, in less than six seconds. By comparison, the same video sent over a

DSL or cable Internet connection would take almost an hour to download.


This system is dubbed WiFiber by its creator, GigaBeam, a Virginia-based

telecommunications startup. Although the technology is wireless, the company s approach --

high-speed data transferring across a point-to-point network -- is more of an alternative

to fiber optics, than to Wi-Fi or Wi-Max, says John Krzywicki, the company s vice

president of marketing. And it s best suited for highly specific data delivery situations.
This kind of point-to-point wireless technology could be used in situations where
digging fiber-optic trenches would disrupt an environment, their cost be prohibitive, or

the installation process take too long, as in extending communications networks in cities,

on battlefields, or after a disaster.


Blasting beams of data through free space is not a new idea. LightPointe and Proxim

Wireless also provide such services. What makes GigaBeam s technology different is that it

exploits a different part of the electromagnetic spectrum. Their systems use a region of

the spectrum near visible light, at terahertz frequencies. Because of this, weather

conditions in which visibility is limited, such as fog or light rain, can hamper data

transmission.
GigaBeam, however, transmits at 71-76, 81-86, and 92-95 gigahertz frequencies, where

these conditions generally do not cause problems. Additionally, by using this region of

the spectrum, GigaBeam can outpace traditional wireless data delivery used for most

wireless networks.
Because so many devices, from Wi-Fi base stations to baby monitors, use the frequencies

of 2.4 and 5 gigahertz, those spectrum bands are crowded, and therefore require complex

algorithms to sort and route traffic -- both data-consuming endeavors, says Jonathan

Wells, GigaBeam s director of product development. With less traffic in the region between

70 to 95 gigahertz, GigaBeam can spend less time routing data, and more time delivering

it. And because of the directional nature of the beam, problems of interference, which

plague more spread-out signals at the traditional frequencies, are not likely; because the

tight beams of data will rarely, if ever, cross each other s paths, data transmission can

flow without interference, Wells says.


Correction: As a couple of readers pointed out, our title was misleading. Although the

emergence of a wireless technology operating in the gigabits per second range is an

advance, it does not outperform current fiber-optic lines, which can still send data much

faster.
Even with its advances, though, Gigabeam faces the same problem as other point-to-

point technologies: creating a network with an unbroken sight line. Still, it could offer

some businesses an alternative to fiber optics. Currently, a GigaBeam link, which consists

of a set of transmitting and receiving radios, costs around $30,000. But Krzywicki says

that improving technology is driving down costs. In addition to outfitting the Trump

towers, the company has deployed a link on the campuses of Dartmouth College and Boston

University, and two links for San Francisco s Public Utility Commission.

7. C3D
C3D has had a breakthrough in the 3-D arena with their FMD technology, which

allows multiple layers of data to be printed onto the surface of a CD-sized 12 cm disk.

What sets FMD apart is the sheer number of layers that are made possible.
C3D�s fluorescent technology could scale up to an impressive 1.4 terabytes of data storage

when applied on a single sided 12 cm disk with 100 layers. With S3D�s new FMD technologies,

gigabytes will replace megabytes as data storage�s common currency.

artificial intelligence for speech recognition


Artificial Intelligence (AI) involves two basic ideas. First, it involves studying the

thought processes of human beings. Second, it deals with representing those processes via

machines (computers, robots, etc). AI is the behavior of a machine, which, if performed by

a human being, would be called intelligent. It makes machines smarter and more useful, is

less expensive than natural intelligence. Natural Language Processing (NLP) refers to

Artificial Intelligence methods of communicating with a computer in a natural language

like English. The main objective of a NLP program is to understand input and initiate

action.

The input words are scanned and matched against internally stored known

words. Identification of a keyword causes some action to be taken. In this way, one can
communicate with computer in one’s language. One of the main benefits of speech

recognition system is that it lets user do other works

8. AKA

AKA stands for the Authentication and Key Agreement security protocol. It is a

mechanism which performs authentication and session key distribution in Universal Mobile

Telecommunications System (UMTS) networks. AKA is a challenge-response based mechanism

that uses symmetric cryptography. AKA is typically run in a UMTS IM Services Identity

Module (ISIM), which resides on a smart card like device that also provides tamper

resistant storage of shared secrets.


Exponential key exchange
The first publicly knownbpublic-key agreement protocol that meets the above criteria was

the Diffie-Hellman exponential key exchange, in which two people jointly exponentiate a

generator with random numbers, in such a way that an eavesdropper has no way of guessing

what the key is.However, exponential key exchange in and of itself does not specify any

prior agreement or subsequent authentication between the participants. It has thus been

described as an anonymous key agreement protocol.


Authentication
Anonymous key exchange, like Diffie-Hellman, does not provide authentication of the

parties, and is thus vulnerable to Man-in-the-middle attacks.A wide variety of

cryptographic authentication schemes and protocols have been developed to provide

authenticated key agreement to prevent man-in-the-middle and related attacks. These

methods generally mathematically bind the agreed key to other agreed-upon data, such as:
Public/private key pairs , Shared secret keys , Passwords

9. Blue Eyes

Definition
Imagine yourself in a world where humans interact with computers. You are sitting

in front of your personal computer that can listen, talk, or even scream aloud. It has the
ability to gather information about you and interact with you through special techniques

like facial recognition, speech recognition, etc. It can even understand your emotions at

the touch of the mouse. It verifies your identity, feels your presents, and starts

interacting with you .You ask the computer to dial to your friend at his office. It

realizes the urgency of the situation through the mouse, dials your friend at his office,

and establishes a connection.

Human cognition depends primarily on the ability to perceive, interpret, and integrate

audio-visuals and sensoring information. Adding extraordinary perceptual abilities to

computers would enable computers to work together with human beings as intimate partners.

Researchers are attempting to add more capabilities to computers that will allow them to

interact like humans, recognize human presents, talk, listen, or even guess their

feelings.
The BLUE EYES technology aims at creating computational machines that have perceptual and

sensory ability like those of human beings. It uses non-obtrusige sensing method,

employing most modern video cameras and microphones to identifies the users actions

through the use of imparted sensory abilities . The machine can understand what a user

wants, where he is looking at, and even realize his physical or emotional states.

The basic idea behind this technology is to give the computer the human power. We all have

some perceptual abilities. That is we can understand each others feelings. For example we

can understand ones emotional state by analyzing his facial expression. If we add these

perceptual abilities of human to computers would enable computers to work together with

human beings as intimate partners. The "BLUE EYES" technology aims at creating

computational machines that have perceptual and sensory ability like those of human

beings.
Theory
Based on Paul Ekman's facial expression work, we see a correlation between a person's

emotional state and a person's physiological measurements. Selected works from Ekman and

others on measuring facial behaviors describe Ekman's Facial Action Coding System (Ekman

and Rosenberg, 1997). One of his experiments involved participants attached to devices to

record certain measurements including pulse, galvanic skin response (GSR), temperature,

somatic movement and blood pressure. He then recorded the measurements as the participants

were instructed to mimic facial expressions which corresponded to the six basic emotions.

He defined the six basic emotions as anger, fear, sadness, disgust, joy and surprise. From

this work, Dryer (1993) determined how physiological measures could be used to distinguish

various emotional states.

Six participants were trained to exhibit the facial expressions of the six basic emotions.

While each participant exhibited these expressions, the physiological changes associated

with affect were assessed. The measures taken were GSR, heart rate, skin temperature and

general somatic activity (GSA). These data were then subject to two analyses. For the

first analysis, a multidimensional scaling (MDS) procedure was used to determine the

dimensionality of the data. This analysis suggested that the physiological similarities

and dissimilarities of the six emotional states fit within a four dimensional model. For

the second analysis, a discriminant function analysis was used to determine the mathematic

functions that would distinguish the six emotional states. This analysis suggested that

all four physiological variables made significant, nonredundant contributions to the

functions that distinguish the six states. Moreover, these analyses indicate that these

four physiological measures are sufficient to determine reliably a person's specific

emotional state. Because of our need to incorporate these measurements into a small, non-
intrusive form, we will explore taking these measurements from the hand. The amount of

conductivity of the skin is best taken from the fingers. However, the other measures may

not be as obvious or robust. We hypothesize that changes in the temperature of the finger

are reliable for prediction of emotion. We also hypothesize the GSA can be measured by

change in movement in the computer mouse. Our efforts to develop a robust pulse meter are

not discussed here.

You might also like